Sciweavers

101 search results - page 10 / 21
» Differential Cryptanalysis of Q
Sort
View
CASC
2007
Springer
124views Mathematics» more  CASC 2007»
13 years 11 months ago
A Full System of Invariants for Third-Order Linear Partial Differential Operators in General Form
We find a full system of invariants with respect to gauge transformations L g-1 Lg for third-order hyperbolic linear partial differential operators on the plane. The operators are...
Ekaterina Shemyakova, Franz Winkler
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
13 years 9 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
EUROCRYPT
2006
Springer
13 years 11 months ago
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
Abstract. Lattice-based signature schemes following the GoldreichGoldwasser-Halevi (GGH) design have the unusual property that each signature leaks information on the signer's...
Phong Q. Nguyen, Oded Regev
FSE
2004
Springer
109views Cryptology» more  FSE 2004»
13 years 11 months ago
On the Additive Differential Probability of Exclusive-Or
We study the differential probability adp of exclusive-or when differences are expressed using addition modulo 2N . This function is important when analysing symmetric primitives t...
Helger Lipmaa, Johan Wallén, Philippe Dumas
INDOCRYPT
2010
Springer
13 years 5 months ago
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions
Abstract. Consider the RSA public key cryptosystem with the parameters N = pq, q < p < 2q, public encryption exponent e and private decryption exponent d. In this paper, cryp...
Santanu Sarkar, Sourav Sengupta, Subhamoy Maitra